You are on page 1of 5

REVISION QUESTIONS

1. a) Describe the use of tags in online communities. (2)


Tags are used to categorise (1) information so that it can be located more easily (1)
b) State the function of social bookmarking. (2)
To allow users to share URLs
2. Explain why online work spaces could benefit a large international organization.
Because the organisation’s workers will be located in different countries (1), which would
make communicating and collaborating on work more difficult or expensive to organize
and time consuming (1) due to differences in time zones and the costs and time associated
with travelling (1). They would also benefit from having centralized resources such as a
virtual meeting spaces, shared documents and shared online calendars (1)
3 Abbas listens to internet radio on his home entertainment system.
i. Give one advantage to Abbas of using internet radio, rather than FM/AM radio.
• Better (audio) quality • Can listen to wider selection of stations / stations outside of (FM/AM)
broadcast range • (More) programme information provided in the broadcast to display • Don’t need a
radio/can listen on other devices • Listen to catch-up / control playback • Less interference / better
signal

ii. Abbas records the radio show. He wants to transfer the recording to his laptop. Give two
ways, other than WiFi, of transferring the recording.
• Memory card (any type) • Optical disc (any type e.g. DVD-RW) • Digital audio cable (e.g. SPDIF/HDMI)
• USB • Firewire • Thunderbolt • Bluetooth • Ethernet/ Powerline • Cloud • Hard drive/USB Drive (any
type)

4. Abbas wants to email the recording to a friend. Name the legislation that make this
illegal.
• Copyright Designs and Patents Act (1988) • Copyright • Digital Economy Act (2010

5. Hana is shopping in the high street. She wants to buy a DVD.


a) She chooses a DVD with this QR code on the packaging.
i. Which one of these smartphone features would she use to input the QR code? (1)
⎕ A Touch screen
⎕ B Camera
⎕ C Infra-red sensor
⎕ D Accelerometer
ii. Hana’s smartphone has a good internet connection. State why this is important when
she accesses the web content. (1)
• Faster/quicker download • Faster/quicker load • Improved/Enhanced/Better/More positive user
experience • Improved reliability • Improved download speed

iii. Online hacker are a threat to the data on Hana’s smartphone. List two other threats to
Hana’s data. (2)
• Viruses / malware • Spyware • (Tracking) Cookies • Scareware • Physical damage to phone (storage)
that corrupts data • Theft of the device • Blue-jacking • Loss of power • Application / system error

b) Hana read a review of the DVD on a forum.


Forum users can rate reviews.
Describe why the forum allows users to rate other people’s reviews. (2)
• Encourage interaction with the site • Increase reliability of reviews (through use of community) • To
enable a wider group of users to moderate content

c) A forum is a type of online community.


List two other online communities. (4)
• Social Networks • Blogs (including photo and videoblogs) • Microblogs • Wikis / user generated
reference sites / social bookmarking • Chat / videochat • Online work spaces / web conferencing •
Virtual worlds • Massively multiplayer online (gaming communities) • VLEs • Webmail Accept ‘dating
sites

d) Hana registers with the forum.


i. Give one benefit to Hana of registering with the forum. (2)
• She can personalise her posts • So she can post / review / comment • Can receive (email) updates •
She can set content preferences • Can access more features • Can report (inappropriate) content / users

ii. Hana is asked to provide her name when registering with the forum.
List three other pieces of information Hana might be asked to provide. (3)
Any three from: • Username/Screen name • Email address • Date of birth/age • Location (e.g.
address/postcode) • Image/Avatar • Social networking info/details • Password/PIN • Bio/Favourites •
Gender • Security question/memorable information • Phone number/contact details •
Language/regional settings

e) Hana pays for the DVD using Near Field Communication (NFC).
Explain how NFC speeds up payment process. (2)
An explanation to include: Users can scan / don’t have to insert their card / enter PIN (1) because NFC is
a contactless/wireless payment method (1)

b) State three ways in which a user can personalize their online profile. (3)
 biographical details such as name, gender, data of birth, location and language (1)
 an ‘about you’ or short description of the user (1)
 details about the user’s work and education (1)
 travel history (1)
 family details such as relationship status, family members and pets (1)
 contact information such as telephone number, email address and website (1)
 Profile and background images, colour schemes and designs (1)
c) Explain why some online communities have administrators and moderators. (3)
 Different levels of user responsibility can be set (1) so that people can be
responsible for quality checking members and their posts (1)
 To ensure that the policies are being followed (1)
 Block posts or enforce sanctions such as banning members from the community (1)
7. a) Rayan creates a personal area network (PAN) with her laptop and her smartphone.
Describe one way that Rayan could use a PAN with these devices. (1)
Rayan could transfer data (1) to back up her phone’s photos/music/videos/contacts (1) OR She could
tether/hotspot/ share her smartphone’s 3G connection (1) giving her laptop access to the Internet (1)
OR She could transfer data between devices (1) using Bluetooth/USB (1)

b) James teaches in a school that uses a local area network and a wide area network.
Discuss the impact of VLEs on learners. (8)
c) Discuss the factors that users of social networking sites should consider when sharing
personal information. (8)

Discussion should include


Cost of and need to protect their safety. - Self censorship and the responsibility of the
individual. To reduce the risk of disclosing too much information, online safety
organisations advise individuals to think carefully about how much of their personal
information they want to make public, and not to post publicly any images containing
information about their location.

Companies sharing users’ personal information - Anonymity Resultant change in


culture and law Nature of digital communication facilitates the wide distribution of
content
Targeted marketing - Gathering / using data / information used for targeted
marketing raises privacy concerns
Cost to users’ privacy - Consideration of audience Unintended audiences (posts
about employers on social media may be read by employers / ‘Jokes’ can be
misinterpreted)

You might also like